Severity High Analysis Summary Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via […]
Severity High Analysis Summary Tofsee malware has been around since 2016. Once installed on a compromised computer, it can be used to send spam emails and […]
Severity Medium Analysis Summary CVE-2022-35719 IBM MQ Internet Pass-Thru 2.1, 9.2 LTS and 9.2 CD stores potentially sensitive information in trace files that could be read […]
Severity Medium Analysis Summary CVE-2022-3413 GitLab Enterprise Edition could allow a remote authenticated attacker to obtain sensitive information, caused by incorrect authorization when displaying Audit Events. […]
Severity Medium Analysis Summary Guloader is currently being distributed via spam email campaigns with archived attachments that contain malware. The majority of malware downloaded by GuLoader […]
Severity Medium Analysis Summary In early 2016, LokiBot was originally made available on underground forums for cybercriminals to use against Microsoft Android phones. This malware steals […]
Severity Medium Analysis Summary The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader […]
Severity High Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, and other […]
Severity High Analysis Summary CVE-2022-43402 Jenkins Pipeline: Groovy Plugin could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a sandbox […]